BrakTooth flaws / LockFile ransomware / Malware hides in AMD, NVIDIA GPUs

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

VMware vSphere, vCenter, and ESXi – definitions and differences

Are you already familiar with VMware technology, and just want to learn more about a variety of provided features and components? Or maybe you are new to VMware virtualization and want to learn about some of the key components needed for creating a successful virtual environment? In this article, you will find information about the VMware VSphere, vCenter, and ESXi, what are those technologies’ purpose, and for what business needs they answer. We will also find differences between vSphere, ESXi, and vCenter.

Read more

VMware vRealize Operations patched / Malicious WhatsApp / MS Power App data leak

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

Linux glibc security glitch / Fortinet 0-day / New AdLoad malware variant

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

VMware ESXi – how to backup a virtual machine

Currently, Microsoft has introduced a new service called Windows 365 Cloud PC according to the “as service” approach it promotes. It is, of course, nothing but virtual computers on Microsoft’s servers. Likewise, containers, of which Docker is perhaps the most famous representative, are virtualized elements or entire operating systems. We can also virtualize the entire physical infrastructure, and that’s what VMware ESXi is for.

Read more

Biggest ever cryptocurrency theft / StealthWorker botnet / ProxyShell

Great thefts stir the imagination like no others. The famous D B Cooper’s case, the United California Bank robbery, or the Great Train Robbery from 1963. Do “electronic” thefts stir the same amount of emotions? It’s hard to say, but when over 600 million dollars disappears from one of the financial platforms, it will bring a lot of hype. But let’s keep our feet on the ground and ask really important questions. Namely, how does it happened, was there a way to prevent the theft, is there any chance to get the money back, and what about the victims – BinanceChain, Ethereum, and Polygon miners?

Read more

How to backup Microsoft 365 with Xopero ONE

Microsoft is a leader in the industry of productivity applications suites. And as such is trying to provide as complex security measures as possible. Yet it’s not possible to avoid nor protect from every threat. That is why you should not blindly trust the protection provided by Microsoft in their Office 365 suite, but rather add layers of protection to ensure your data is safe. That layer of protection can be a Microsoft 365 backup. With Xopero ONE Backup & Recovery you can set up Microsoft 365 backup, manage it, and recover data if needed with ease. In this article, we will walk you through the steps you need to take to start backup Microsoft 365 data in your organization with Xopero ONE, and we will go into more detail about setting up a personalized backup plan.

Read more

VMware snapshot technology: what it is and when to use it

In recent years, VMware has put great emphasis on its cloud technologies. Still, you have to remember that estimates show that the company’s solutions are present on about 75% (data for 2019-2020) of physical servers intended for virtualization on our globe. This means that VMware ESXi is still a leading virtualization solution, and one of the most appreciated features of this solution is undoubtedly the snapshot technology. Thanks to snapshots, for example, we can do some “kind of backup” at the moment without stopping the virtual machine, and this is something that everyone loves, but why shouldn’t I use the word “backup” in this sentence?

Read more

Critical VMware vulnerabilities / LockBit 2.0. recruits insiders / Super Duper Secure Mode in Microsoft Edge

Critical VMware vulnerabilities are not the only problem faced by this virtualization software vendor last week. Do you remember the BlackMatter group that proclaimed itself to be the successor of REvil we warned you against in the last issue? It already has an encryption program targeting VMware ESXi. Today we also describe a unique business model of the new LockBit 2.0. and a cyberespionage campaign targeting the largest telecoms. For the sake of balance, we are describing a new project from Microsoft – with “Super Duper Secure Mode” the company wants to change the landscape of exploits and increase the cost of attacks.

Read more